Difference between revisions of "Malware"
Bob Zenith (talk | contribs) |
Vicentederek (talk | contribs) (→Popular Malware Removal Tools) |
||
(One intermediate revision by one other user not shown) | |||
Line 1: | Line 1: | ||
− | Malware is a category of malicious code that includes [[Computer Virus|viruses]], worms, [[Spyware | + | Malware is a category of malicious code that includes [[Computer Virus|viruses]], [[Computer Worm|worms]], [[Spyware]]/[[Adware]] programs, [[Keylogger|keyloggers]], and [[Trojan Horse|Trojans]]. Destructive malware will utilize communication tools to spread, including worms sent via email and IMs, Trojan horses inside web sites, and viruses files downloaded from P2P connections. Malware will also seek to exploit existing vulnerabilities on systems making their entry quiet and easy. [http://www.symantec.com/norton/security_response/malware.jsp] |
− | + | ||
== Protecting Yourself from Malware == | == Protecting Yourself from Malware == | ||
Line 14: | Line 14: | ||
== Popular Malware Removal Tools == | == Popular Malware Removal Tools == | ||
− | * Emsisoft | + | * Emsisoft Antimalware - [https://www.emsisoft.com/en/software/antimalware/ visit] |
− | * | + | * Malwarebytes Anti-Malware - [https://malwarebytes.org/ visit] |
− | * Microsoft Security Essentials - [ | + | * Microsoft Security Essentials - [http://www.microsoft.com/business/en-sg/Solutions/Pages/Security.aspx visit] |
Latest revision as of 03:32, 16 July 2012
Malware is a category of malicious code that includes viruses, worms, Spyware/Adware programs, keyloggers, and Trojans. Destructive malware will utilize communication tools to spread, including worms sent via email and IMs, Trojan horses inside web sites, and viruses files downloaded from P2P connections. Malware will also seek to exploit existing vulnerabilities on systems making their entry quiet and easy. [1]
Protecting Yourself from Malware
- Only open emails, IMs, and attachments from trusted sources and/or when they are expected
- If possible, have emails and attachments scanned by an anti-virus or anti-malware software
- Delete all unwanted messages without opening them
- Do not click on any suspicious web links, or links from an unknown/suspicious sender
- Only transfer files from a trusted, secure source
- Keep security patches up-to-date; always update your software